Upload
others
View
12
Download
0
Embed Size (px)
Citation preview
www.netwrix.com
Know Your Data. Protect What Matters.
Netwrix Auditor
01Product Overview
Netwrix Auditor is an agentless data security platform that empowers organizations to accurately identify sensitive, regulated and mission-critical information and apply access controls consistently, regardless of where the information is stored. It enables them to minimize the risk of data breaches and ensure regulatory compliance by proactively reducing the exposure of sensitive data and promptly detecting policy violations and suspicious user behavior.
IdentifyUnderstand which data needs protection and how exposed it is.
Netwrix Auditor Platform
ProtectMinimize the risk of a data breach.
DetectPromptly detect data security threats.
RespondMake faster and more informed incident response decisions.
RecoverFacilitate the recoveryof key data and learnfrom past incidents.
ComplyAchieve and proveregulatory compliance.
Understand which data needs protection and how exposed it is
Identify and classify sensitive data, both structured and unstructured, and data and infrastructure risks that might endanger its security.
Minimize the risk of a data breach
See who has access to what and proactively remediate the overexposure of sensitive, regulated and mission-critical data.
Promptly detect data security threats
Spot abnormal user behavior and policy violations that threaten data security.
Make faster and more informed incident response decisions
Reduce mean time to respond to data security threats and contain incidents.
Facilitate the recovery of key data and learn from past incidents
Review comprehensive details about how a security incident happened and what data was affected.
Achieve and prove regulatory compliance
Proactively assess the effectiveness of your data security controls and prove your compliance to auditors with hard evidence.
02Benefits
03Understand which data needs protection and how exposed it is
Classify and tag both unstructured and structured data regardless of its location so you can prioritize the security of sensitive information. Apply security policies consistently across multiple data repositories.
Prioritize the security of sensitive data across multiple data silos
See which pieces of sensitive dataare most at risk so you can prioritize remediation of those risks. Discover sensitive information that is exposedto a large number of users without a business need or that is stored in an unsecure location.
Identify overexposed sensitive data
04Understand which data needs protection and how exposed it is
Identify both data and infrastructure security gaps, such as a large number of directly assigned permissions or too many inactive user accounts. Continuously evaluate these security metrics and focus on what’s most important.
Assess data and infrastructure security risks
If access controls around sensitive data are not risk-appropriate, automatically remove all rights to read or modify this information from global access groups like Everyone.
Immediately lock down sensitive data that is overexposed
05Minimize the risk of a data breach
If a sensitive document pops up in an unexpected location, automatically move itto a quarantine area until you can determine where it should be stored and who should have access to it.
Automatically quarantine sensitive data to reduce the risk of a breach or loss
06Minimize the risk of a data breach
See who has access to what sensitive data and how they got that access, and enable data owners to regularly verify that these rights are in line with business needs. If they aren’t, remove excessive permissions to enforce the least-privilege principle and keep risk at an acceptable level.
Streamline regular privilege attestations
07Minimize the risk of a data breach
Redact sensitive information basedon corporate policyReduce the risk of exposure of confidential information by automatically redacting sensitive content from documents if there’s no business requirement for it to be there. Maintain productivity by keeping the restof the document intact.
Non-sensitive items tagged by mistakedo not require protection. Optimize your data security efforts by increasing the accuracy of your data loss prevention (DLP) tool using the high-precision classification tags written by Netwrix Auditor.
Increase the precisionof your DLP solution
DLPsolution
IP PII PCI DSS
PHIGDPR
Continuously monitor the activity of privileged users across all systems to ensure that they follow internal policies and don’t abuse their privileges to access, modify or delete sensitive data without being caught.
Establish strict accountability over the use of privileged accounts
08Promptly detect data security threats
Detect any changes to access rights or group membership so you can assess whether any permissions to sensitive data have been modified without a legitimate reason. Quickly revert any improper changes to reduce risk.
Stay on top of privilege escalation
09Promptly detect data security threats
Carefully monitor the activity of third-party user accounts in any system or application, even if it doesn’t produce any logs,to ensure full accountability. Get notifiedany time a vendor does something outsideof their scope of activity, since their unauthorized actions could put your data at risk.
Keep third-party activity under close scrutiny
Get alerted about signs of possible ransomware activity, such as a large number of file modifications in a very short period of time. Quickly isolate the user account responsible to stop the ransomware from encrypting all the files that account has access to across your network.
Detect ransomware attacks in progress
Promptly detect even subtle signs of possible data security threats in progress, such as unusual logons or users accessing sensitive data they haven’t accessed before. Easily identify and investigate the users who pose the most risk with an aggregated view of the anomalous activity by each individual.
Detect compromised accounts and malicious insiders
10Promptly detect data security threats
Make faster and more informed incidentresponse decisions
11
Quickly get to the bottom of incidents involving sensitive data: Understand exactly what happened, how it happened, who was behind it and which pieces of information were affected. Use this context to formulate the best possible response to the incident.
Streamline incident investigation
React to data security threats faster by automating response to anticipated incidents. Provide initial incident support and enable faster, more accurate investiga-tions by integrating Netwrix Auditor into your SecOps process.
Reduce the mean time to respond
12Make faster and more informed incidentresponse decisions
Analyze how much data a malicious insider or a compromised account had access to and exactly which pieces of data were actually viewed, modified or deleted. Use this information to determine whether you need to report the incident and, if necessary, to notify all affected parties and take other appropriate steps.
Determine and report the severity of a data breach
13Facilitate the recovery of key dataand learn from past incidents
Inventory your data and see where the most sensitive or valuable data is located. Create information recovery plans that prioritize the restoration of that data.
Understand the value and sensitivity of data to plan information recovery processes
Determine which sensitive, confidential or mission-critical data was corrupted during an attack and prioritize its recovery. See who had what access to those documents to get your business users back up and running as soon as possible.
Get back up and running faster by prioritizing the recovery of key data
14Facilitate the recovery of key dataand learn from past incidents
Analyze exactly how a security incident occurred and use this information to improve your data security strategyand prevent similar incidents in the future.
Incorporate lessons learned into your data security strategy
15Achieve and prove regulatory compliance
Implement compliance controls across your entire infrastructure and regularly assess whether they work as intended.If written security policies differ from what’s actually in place, you can fix your faulty data security controls before auditors discover them.
Assess the effectiveness of data security controls
Easily find all data you store about a particular data subject when they exercise their privacy rights under GDPR, CCPA and other modern regulations. Provide them with a list of this information or erase it completely if they withdraw their consent.
Comply with access requests
16Achieve and prove regulatory compliance
Prepare for the bulk of auditors’ requests by taking advantage of out-of-the-box reports aligned to the compliance controls of HIPAA/HITECH, PCI DSS, GDPR and other common regulations.
Slash time spent on compliance preparation and audits
Keep your audit trail archived in a compressed format for more than 10 years, as required by many regulations, while ensuring that all audit data can easily be accessed by authorized users at any time.
Store and access your audit trail for years
17Applications
Netwrix Auditor ApplicationsNetwrix Auditor platform includes a broad range of applications that provide a single-pane-of-glass-view of what’s going on across both data storages and backbone IT systems. This insight enables organizations to understand where sensitive data is located, what the risks around it are and what activity is threatening its security.
Netwrix Auditor for Active Directory
Netwrix Auditor for Windows Server
Netwrix Auditor for VMware
Netwrix Auditor for
Network Devices
Infrastructure
Netwrix Auditor for Windows File Servers
Netwrix Auditor for EMC
Netwrix Auditor for NetApp
Netwrix Auditor for
SharePoint
Netwrix Auditor for
Exchange
Unstructured Data
Netwrix Auditor for Oracle Database
Netwrix Auditor for SQL Server
Structured Data
Netwrix Auditor for Office 365
Netwrix Auditor for Azure AD
Cloud
Fully supported onMicrosoft WindowsServer
Deployment Options
On-premises, virtual or cloud — deploy Netwrix Auditorwherever you need it
Available in appliances for VMware and Microsoft Hyper-V
Fully supported and tested in Microsoft Azure
Fully supported in AWS Marketplace
MicrosoftHyper-V Microsoft Azure
On-premises Virtual Cloud
Windows Server
RESTful API — endless integration capabilities for improved data security and streamlined reporting
Centralize auditing and reporting
Netwrix Auditor collects activity trails from any on-premises or cloud applications and stores themin a secure central repository, ready for historic reviews and compliance inquiries.
Get the most from your SIEM investment
By feeding granular audit datainto your HP Arcsight, Splunk,IBM QRadar or other SIEMsolutions, Netwrix Auditorincrease the signal-to-noiseratio and maximizes SIEM value.
Visit the Netwrix Auditor Add-on Store at www.netwrix.com/go/add-ons to find free add-ons built to integrate Netwrix Auditor with your IT ecosystem.
Automate IT workflows
Netwrix Auditor integrates with other IT security, compliance and data management tools, thereby automating and improving IT workflowsand SecOps processes.
Government, 3,8K employees
Johnson County in Kansas streamlines detection and investigation of suspicious events with Netwrix Auditor.
Education, 1K employees
William Woods University uses Netwrix Auditor to reduce risk of data exposure and improve security posture.
Energy, 5,8K employees
Pike Electric troubleshoots security issues faster and ensures business continuity using Netwrix Auditor.
Built for IT environments of all sizes,Netwrix Auditor architecture supportsthe growth of your organization
Nonprofit, 150 employees
Horizon Leisure Centres accelerates data classification to ensure the security of sensitive data and comply with GDPR.
Copyright © Netwrix Corporation. All rights reserved. Netwrix is trademark of Netwrix Corporation and/or one or more of its subsidiaries and may be registered in the U.S. Patent and Trademark Office and in other countries. All other trademarks and registered trademarks are the property of their respective owners.
netwrix.com/social
Next Steps
Corporate Headquarters:
300 Spectrum Center Drive, Suite 200, Irvine, CA 92618
Phone: 1-949-407-5125 Toll-free: 888-638-9749 EMEA: +44 (0) 203-588-3023
Awards
Free Trial: setup in your own test environment On-premises: netwrix.com/freetrial
Virtual: netwrix.com/go/appliance
Cloud: netwrix.com/go/cloud
In-Browser Demo: interactive product demo in your browser netwrix.com/browser_demo
Live Demo: product tour with Netwrix expert netwrix.com/livedemo
Contact Sales to obtain more information netwrix.com/contactsales